US20070164847A1 - System and method for locking electronic devices - Google Patents

System and method for locking electronic devices Download PDF

Info

Publication number
US20070164847A1
US20070164847A1 US11/424,609 US42460906A US2007164847A1 US 20070164847 A1 US20070164847 A1 US 20070164847A1 US 42460906 A US42460906 A US 42460906A US 2007164847 A1 US2007164847 A1 US 2007164847A1
Authority
US
United States
Prior art keywords
user
location
electronic device
lock
tags
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/424,609
Inventor
Michael Crawford
Fintan Fairmichael
Kevin Tadgh O'Riordan
Stephen Tapley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: O'RIORDAN, KEVIN TADGH, CRAWFORD, MICHAEL, FAIRMICHAEL, FINTAN, TAPLEY, STEPHEN
Publication of US20070164847A1 publication Critical patent/US20070164847A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Definitions

  • This invention relates to the field of security of electronic devices and, in particular, to locking devices to prevent use by unauthorized persons.
  • IT Information Technology
  • PDA personal digital assistant
  • Known security solutions include apparatus in which a sensor is coupled to a computer and reads a badge of a user. If the badge of an authorized user is not detected by the sensor, the computer locks.
  • pcProx Sonar (trade mark of RFIDeas Inc. see http://www.rfideasstore.com/rfideas/pcproxsonarsdk.html) which is a device that attaches to a personal computer via the USB port and is configured by the system as a keyboard.
  • a user wears a passive RFID (radio frequency identification) badge. If the badge is taken away from the computer, a detector in the device determines this and locks the computer. The device sends commands by keystrokes to lock the computer.
  • a disadvantage of this apparatus is that the device is attached to the computer and therefore, each computer must have its own device. Another disadvantage is that as the device replicates keystrokes with a time lapse, they are subject to interruption by someone using the keyboard itself. Finally, if the device is removed from the computer, the system will cease to function.
  • a system for locking electronic devices comprising: a plurality of identification tags each identifying a user; a plurality of electronic devices each having an identification tag; location sensors for detecting the location of a tag; a database storing location information of tags and associations of a user with a plurality of devices; and a remote locking means to invoke a lock command or an unlock command on an electronic device.
  • the remote locking means may invoke a lock command or an unlock command depending on the locations of the device and an associated user.
  • An electronic device may have one or more associated users. An electronic device may be locked if it is not is the same location as one of its associated users.
  • the identification tags are radio frequency identification transponders and the location sensors are radio frequency identification readers.
  • a controller may receive location information transmitted by the location sensors and may store the information in the database. At least some of the location sensors may be provided at entry and exit points of a room and may include direction sensors.
  • the remote locking means may be provided on a server which issues commands to a service on a remote electronic device.
  • the remote locking means may operate via a network.
  • a method for locking electronic devices comprising: detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user; determining the location of an electronic device and an associated user; invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
  • Detecting the location may include detecting the direction of movement at an entry or exit point. Detected location information transmitted by the location sensors may be received and stored.
  • Invoking a lock or unlock command may include a server issuing a command to a service on a remote electronic device.
  • the lock or unlock command may be invoked depending on the locations of a user and an associated device.
  • a computer program product stored on a computer readable storage medium, comprising computer readable program code means for performing the steps of: detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user; determining the location of an electronic device and an associated user; invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
  • a method of providing a service to a customer over a network comprising: detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user; determining the location of an electronic device and an associated user; invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
  • the core idea of this invention involves attaching identification tags to computers and their operators.
  • Each office space has tag sensors at the entrances that have the ability to track movement of tags through them. In this way, it is possible to determine the location of an employee and the employee's associated electronic devices.
  • the system On detecting an employee leaving the office, the system will ascertain the location of the employee's electronic devices. If an electronic device associated with the employee is in a different location to the employee, a lock command is sent to the electronic device.
  • This solution adds to the security of a user's computer and other electronic devices, and readily complements the current solution of locking a computer after a period of inactivity.
  • FIG. 1 is a schematic representation of a system of tag identification in accordance with the present invention
  • FIG. 2 is a plan view of an office environment implementing a system in accordance with the present invention
  • FIG. 3 is a block diagram of a computer system in accordance with the present invention.
  • FIGS. 4A and 4B are flow diagrams of methods of operation in accordance with the present invention starting when a user and device are in the same location;
  • FIGS. 5A and 5B are flow diagrams of methods of operation in accordance with the present invention starting when a user and device are in different locations.
  • a security system in which one or more users and a plurality of devices are tagged with electronic tags and the system activates locking commands on the devices when they are not in the same location as their designated user.
  • RFID Radio Frequency Identification
  • Radio frequency identification (RFID) technology exists in which tags are provided in the form of transponders that are embedded in items to act as identifiers of the items. Readers or scanners act as an interface between the transponders and a data environment. Transponders and the means used to read them are available is a number of forms. Any suitable form can be used for the purposes of the present invention.
  • the antenna emits radio signals to activate the tag and to read and/or write data to it.
  • Antennas can be built into a door frame to receive tag data from persons or things passing through the door.
  • the electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually, or, if constant interrogation is not required, the field can be activated by a sensor device.
  • the antenna has a transceiver and decoder to provide a reader.
  • a tag passes through the antenna zone, it detects the reader's activation signal.
  • the reader decodes the data encoded in the tag's integrated circuit and the data is passed to a host computer for processing.
  • the tags are either active or passive. Active RFID tags are powered by an internal battery and are typically read/write. Passive RFID tags are read only and operate without a power source by obtaining operating power generated from the reader. The advantage of RFID tags is they do not require contact or line-of-sight to be read.
  • One or more tags can be inserted into any form of object at the time of manufacture and may remain in the object until the object is destroyed. It may also be possible to destroy or deactivate the tag before the object hosting it is destroyed. Similarly a tag may be added to an object at any time during the lifetime of the object.
  • a user 120 has multiple devices 110 which belong or are designated to the user.
  • the devices 110 may be in the form of a personal computer 121 , a telephone 122 , a laptop computer 123 , and a PDA 124 .
  • the devices 110 may be easily portable, such as a laptop computer, a mobile telephone, or a PDA.
  • Other devices 110 may be fixed or more difficult to move such as personal computers.
  • the user 100 and each of the devices 110 have a tag 130 .
  • the user's tag 130 may be provided as an identity card, or may be embedded in a badge or other item to be carried by the user 120 .
  • the devices 110 each have tags 130 embedded in them in a non-removable manner.
  • the tags 130 in the devices 110 include identification information of the device 110 in which it is embedded and, optionally, identification information of one or more users 120 associated with the device 110 .
  • the tag 130 of the user 120 includes identification information of the user 120 and, optionally, identification information of all the devices 110 associated with the user 120 .
  • FIG. 2 a plan of an office space 200 is shown. Sensors are provided at the doors 211 , 212 and on the internal walls or partitions 213 - 216 of the office space.
  • a first user A 220 has a work area 225 in the office space 200 and the first user A 220 has devices in the form of a personal computer 221 , a mobile telephone 222 , and a laptop computer 223 . These devices 221 - 223 are designated as belonging to or associated with a first user A 220 .
  • First user A 220 has a tag 230 and each of the first user's devices 221 - 223 have embedded tags 230 .
  • the tags 230 are shown in FIG. 2 as shaded diamonds for the purposes of illustration.
  • a second user B 240 has a work area 245 in the office space 200 .
  • the second user B 240 has devices in the form of a personal computer 241 , a mobile telephone 242 , a laptop computer 243 , and a PDA 244 . These devices 241 - 244 are designated as belonging to the second user B 240 .
  • Second user B 240 has a tag 230 and each of the second user's devices 241 - 244 have embedded tags 230 .
  • FIG. 2 shows the first user A 220 sitting at his desk in his work area 225 .
  • the work area 225 is scanned by sensors 213 and 214 mounted on the walls near the work area 225 detecting the tags 230 of the first user A 220 and all his devices 221 - 223 which are with him in the work area 225 .
  • FIG. 2 shows the second user B 240 walking out of the office space 200 .
  • He has left his work area 245 and passed the door sensor 211 leaving the office space 200 .
  • Second user B 240 is carrying his mobile telephone 242 and has his PDA 244 with him but has left his personal computer 241 and his laptop computer 243 on his desk in his work area 245 .
  • Wall sensors 215 , 216 mounted on walls near his work area 245 scan the tags 230 in the personal computer 241 and the laptop computer 243 .
  • the door sensor 211 scans the tags 230 of the second user B 240 and his mobile telephone 242 and his PDA 244 .
  • RFID sensors 211 - 216 detect the presence of compatible RFID tags 230 nearby. By placing RFID sensors at the entrance and exit points of designated rooms it is possible to detect when a user or device carrying an RFID tag is nearby. By combining this information with data obtained from direction sensors at the same entry or exit point it is possible to determine that a certain user or a device has entered or exited a room. If the last detected event for a user or device is to have entered a room, the system will implicitly assume that this user or device is currently present in this room.
  • An office space 200 can be divided into areas, which may be of uniform size or which may vary in size.
  • One or more sensors may scan an area. Sensors may also be provided at points of entry or exit from areas.
  • a system 300 is shown.
  • a plurality of sensors 211 - 213 are provided each with an antenna 311 , a reader 312 and a transmitter 313 .
  • Sensors 211 , 212 which are located on entry or exit points of an area also have direction detectors 314 to determine if a tag has passed into or out of an area.
  • the sensors 211 - 213 transmit data read from tags to a location application 320 which is provided on a server 330 .
  • the data may be transmitted via a network 340 , for example, a LAN, or the Internet.
  • the server 330 also runs a client service application 350 .
  • Client devices 370 with tags 230 (for example, a tagged personal computer 221 or a tagged mobile telephone 222 ) run the client side 355 service applications 350 via the network 340 .
  • the service application 350 enables commands to be sent by the server 330 to a client device 370 to lock the device 370 .
  • the server 330 is also coupled to a database 360 which persistently stores the location information of the users and devices. By having this location information available, it is possible to determine whether a device and its owner are situated in the same or different places. Furthermore, the system will store an association between a device and its owner, with the possibility of having more than one device linked to a particular user.
  • Each tagged device 370 has a service application 355 running that is able to receive commands from the centralized server 330 . Whenever the system detects that a user or device leaves an area (for example, a room), the location of the user in question is derived, followed by the location of the devices assigned to the user. If it is the case that any of these associated pairs of entities are in different locations, a message is sent to the service 355 running on the device 370 , which secures the device 370 (for example, by issuing the lock command to a computer).
  • the system will only lock if the two entities are in different locations to each other for predetermined amount of time (e.g. approximately 5 seconds) after the location change is detected. This is to ensure that a lock command is sent in error due to a delay in the system's location sensing mechanism.
  • FIGS. 4A and 4B are flow diagrams 400 , 450 of methods of operation as implemented by the server 330 starting when a user and device are in the same location.
  • the flow diagram 400 of FIG. 4A starts with a user and a device in the same location 401 and therefore the device is unlocked.
  • a sensor detects 402 the change in location of the device, for example, a door sensor may detect movement of the device out of a room or work area.
  • the user who started off in the same location as the device has changed location with the device, for example, by carrying the device out of a room;
  • a device may have more than one associated user and these users are determined 403 in the next step of the method.
  • the method determines 404 the location of one of the associated users and whether or not the location is the same as the location of the device 405 . If the location is the same as the device 406 , the device is kept unlocked 407 . As the device is with one of the associated users, the location of any other associated users is not relevant and therefore the method returns to the start 401 with a user and the device in the same location.
  • the method loops 410 to determine 404 the location of the next associated user. If the location 408 is not the same as the device and there are no further associated users 411 , a message is sent to the service on the device to lock it 412 . The device is locked as it is not in the same location as any one of the associated users.
  • the flow diagram 450 of FIG. 4B also starts with a user and a device in the same location 451 and therefore the device is unlocked.
  • a sensor detects 452 the change in location of the user, for example, a door sensor may detect movement of the user out of a room or work area. In this case it is necessary to lock all devices which the user has left behind, whilst keeping unlocked any devices the user has taken with him.
  • the method determines 453 the devices associated with the user and determines 454 the location of each device in turn. It is determined 455 if the location of the device is the same as the location of the user. If the location is the same 456 , the device is kept unlocked 457 . If the location is not the same 458 , a message is sent to the service on the device to lock it 459 . In both case, the method proceeds to determine 460 if there is another device. If there is another device, the method loops 461 to determine the location of the next device 454 . If there are no more devices, the method ends with each device being locked or unlocked according to its location 462 .
  • FIGS. 5A and 5B are flow diagrams 500 , 550 of methods of operation as implemented by the server 330 starting when a user and device are in different locations.
  • the flow diagram 500 of FIG. 5A starts with the user and device in different locations 501 .
  • a sensor detects 502 a change in location of a device.
  • the users associated with the device which has moved are determined 503 .
  • the method determines 504 the location of one of the associated users and whether or not the location is the same as the location of the device 505 . If the location is the same as the device 506 , a message is sent to the service on the device to unlocked it 507 as it is now in the same location as an associated user. As the device is with one of the associated users, the location of any other associated users is not relevant and therefore the method ends with a user and the device in the same location.
  • the method loops 510 to determine 504 the location of the next associated user. If the location 508 is not the same as the device and there are no further associated users 511 the device remains locked 512 .
  • the flow diagram 550 of FIG. 5B starts with the user and device in different locations 551 .
  • a sensor detects 552 the change in location of the user, for example, a door sensor may detect movement of the user into a room or work area. In this case it is necessary to unlock all devices in the location the user has arrived at.
  • the method determines 553 the devices associated with the user and determines 554 the location of each device in turn. It is determined 555 if the location of the device is the same as the location of the user. If the location is the same 556 a message is sent to the device to unlock it 557 . If the location is not the same 558 , the device remains locked 559 . In both case, the method proceeds to determine 560 if there is another device. If there is another device, the method loops 561 to determine the location of the next device 554 . If there are no more devices, the method ends with each device being locked or unlocked according to its location 562 .
  • the operation of the location application and client service application may be provided as a service to a customer over a network.
  • FIG. 1 The figures include block diagram and flowchart illustrations of methods, apparatus(s) and computer program products according to an embodiment of the invention. It will be understood that each block in such figures, and combinations of these blocks, can be implemented by computer program instructions. These computer program instructions may be loaded onto a computer or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the block or blocks.
  • programs defining the functions of the present invention can be delivered to a computer in many forms; including, but not limited to: (a) information permanently stored on non-writable storage media (e.g. read only memory devices within a computer such as ROM or CD-ROM disks readable by a computer I/O attachment); (b) information alterably stored on writable storage media (e.g. floppy disks and hard drives); or (c) information conveyed to a computer through communication media for example using wireless, baseband signaling or broadband signaling techniques, including carrier wave signaling techniques, such as over computer or telephone networks via a modem.
  • non-writable storage media e.g. read only memory devices within a computer such as ROM or CD-ROM disks readable by a computer I/O attachment
  • writable storage media e.g. floppy disks and hard drives
  • information conveyed to a computer through communication media for example using wireless, baseband signaling or broadband signaling techniques, including carrier wave signaling techniques

Abstract

A system and method are provided for locking electronic devices when the devices are not in the same location as a user associated with the device. The system includes a plurality of users each having an identification tag and a plurality of electronic devices each having an identification tag. Location sensors are provided in a room and at entry and exit points for detecting the location of the tags. A database stores the location information of tags and associations of a user with one or more devices. A remote locking means invokes a lock command or an unlock command on an electronic device depending on whether or not the electronic device is in the same location as a user associated with the device. In one embodiment, the identification tags are radio frequency identification transponders and the location sensors are radio frequency identification readers.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present application claims priority under 35 USC 119 to United Kingdom Application Number GB0600465.9, filed Jan. 11, 2006.
  • FIELD OF THE INVENTION
  • This invention relates to the field of security of electronic devices and, in particular, to locking devices to prevent use by unauthorized persons.
  • BACKGROUND OF THE INVENTION
  • The security of information is of crucial importance within the Information Technology (IT) industry. It is as important to protect information within the constraints of an office as it is from external attacks. Taking this into account, many organizations enforce a policy where employees must lock their workstation whenever they are not at their desk. Similarly, other electronic devices that could pose a security risk if left unattended, must also be secured. Examples of these devices include telephones, laptops, and personal digital assistants (PDAs).
  • In most modern operating systems, a user can set a computer to lock automatically after a specified period of inactivity. However, this solution is not ideal. If an employee leaves his desk without locking his computer, someone else can begin to use the computer straight away keeping it active and preventing the computer from locking.
  • Known security solutions include apparatus in which a sensor is coupled to a computer and reads a badge of a user. If the badge of an authorized user is not detected by the sensor, the computer locks.
  • One example of such an apparatus is the pcProx Sonar (trade mark of RFIDeas Inc. see http://www.rfideasstore.com/rfideas/pcproxsonarsdk.html) which is a device that attaches to a personal computer via the USB port and is configured by the system as a keyboard. A user wears a passive RFID (radio frequency identification) badge. If the badge is taken away from the computer, a detector in the device determines this and locks the computer. The device sends commands by keystrokes to lock the computer.
  • A disadvantage of this apparatus is that the device is attached to the computer and therefore, each computer must have its own device. Another disadvantage is that as the device replicates keystrokes with a time lapse, they are subject to interruption by someone using the keyboard itself. Finally, if the device is removed from the computer, the system will cease to function.
  • SUMMARY OF THE INVENTION
  • According to a first aspect of the present invention there is provided a system for locking electronic devices, comprising: a plurality of identification tags each identifying a user; a plurality of electronic devices each having an identification tag; location sensors for detecting the location of a tag; a database storing location information of tags and associations of a user with a plurality of devices; and a remote locking means to invoke a lock command or an unlock command on an electronic device.
  • The remote locking means may invoke a lock command or an unlock command depending on the locations of the device and an associated user. An electronic device may have one or more associated users. An electronic device may be locked if it is not is the same location as one of its associated users.
  • In one embodiment, the identification tags are radio frequency identification transponders and the location sensors are radio frequency identification readers.
  • A controller may receive location information transmitted by the location sensors and may store the information in the database. At least some of the location sensors may be provided at entry and exit points of a room and may include direction sensors.
  • The remote locking means may be provided on a server which issues commands to a service on a remote electronic device. The remote locking means may operate via a network.
  • According to a second aspect of the present invention there is provided a method for locking electronic devices, comprising: detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user; determining the location of an electronic device and an associated user; invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
  • Detecting the location may include detecting the direction of movement at an entry or exit point. Detected location information transmitted by the location sensors may be received and stored.
  • Invoking a lock or unlock command may include a server issuing a command to a service on a remote electronic device. The lock or unlock command may be invoked depending on the locations of a user and an associated device.
  • According to a third aspect of the present invention there is provided a computer program product stored on a computer readable storage medium, comprising computer readable program code means for performing the steps of: detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user; determining the location of an electronic device and an associated user; invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
  • According to a fourth aspect of the present invention there is provided a method of providing a service to a customer over a network, the service comprising: detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user; determining the location of an electronic device and an associated user; invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
  • The core idea of this invention involves attaching identification tags to computers and their operators. Each office space has tag sensors at the entrances that have the ability to track movement of tags through them. In this way, it is possible to determine the location of an employee and the employee's associated electronic devices. On detecting an employee leaving the office, the system will ascertain the location of the employee's electronic devices. If an electronic device associated with the employee is in a different location to the employee, a lock command is sent to the electronic device.
  • This solution adds to the security of a user's computer and other electronic devices, and readily complements the current solution of locking a computer after a period of inactivity.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In order to facilitate a fuller understanding of the present invention, reference is now made to the appended drawings. These drawings should not be construed as limiting the present invention, but are intended to be exemplary only.
  • FIG. 1 is a schematic representation of a system of tag identification in accordance with the present invention;
  • FIG. 2 is a plan view of an office environment implementing a system in accordance with the present invention;
  • FIG. 3 is a block diagram of a computer system in accordance with the present invention;
  • FIGS. 4A and 4B are flow diagrams of methods of operation in accordance with the present invention starting when a user and device are in the same location; and
  • FIGS. 5A and 5B are flow diagrams of methods of operation in accordance with the present invention starting when a user and device are in different locations.
  • DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
  • A security system is provided in which one or more users and a plurality of devices are tagged with electronic tags and the system activates locking commands on the devices when they are not in the same location as their designated user.
  • An embodiment of such electronic tags is provided by Radio Frequency Identification (RFID) technology, although other forms of tags and readers may be used.
  • Radio frequency identification (RFID) technology exists in which tags are provided in the form of transponders that are embedded in items to act as identifiers of the items. Readers or scanners act as an interface between the transponders and a data environment. Transponders and the means used to read them are available is a number of forms. Any suitable form can be used for the purposes of the present invention.
  • The antenna emits radio signals to activate the tag and to read and/or write data to it. Antennas can be built into a door frame to receive tag data from persons or things passing through the door. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually, or, if constant interrogation is not required, the field can be activated by a sensor device.
  • The antenna has a transceiver and decoder to provide a reader. When a tag passes through the antenna zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit and the data is passed to a host computer for processing.
  • The tags are either active or passive. Active RFID tags are powered by an internal battery and are typically read/write. Passive RFID tags are read only and operate without a power source by obtaining operating power generated from the reader. The advantage of RFID tags is they do not require contact or line-of-sight to be read.
  • One or more tags can be inserted into any form of object at the time of manufacture and may remain in the object until the object is destroyed. It may also be possible to destroy or deactivate the tag before the object hosting it is destroyed. Similarly a tag may be added to an object at any time during the lifetime of the object.
  • Referring to FIG. 1, a user 120 has multiple devices 110 which belong or are designated to the user. For example, the devices 110 may be in the form of a personal computer 121, a telephone 122, a laptop computer 123, and a PDA 124. The devices 110 may be easily portable, such as a laptop computer, a mobile telephone, or a PDA. Other devices 110 may be fixed or more difficult to move such as personal computers. There may be more than one user 120 who is authorized to have access to the device 110.
  • The user 100 and each of the devices 110 have a tag 130. The user's tag 130 may be provided as an identity card, or may be embedded in a badge or other item to be carried by the user 120. The devices 110 each have tags 130 embedded in them in a non-removable manner.
  • The tags 130 in the devices 110 include identification information of the device 110 in which it is embedded and, optionally, identification information of one or more users 120 associated with the device 110. The tag 130 of the user 120 includes identification information of the user 120 and, optionally, identification information of all the devices 110 associated with the user 120.
  • Referring to FIG. 2, a plan of an office space 200 is shown. Sensors are provided at the doors 211, 212 and on the internal walls or partitions 213-216 of the office space.
  • A first user A 220 has a work area 225 in the office space 200 and the first user A 220 has devices in the form of a personal computer 221, a mobile telephone 222, and a laptop computer 223. These devices 221-223 are designated as belonging to or associated with a first user A 220. First user A 220 has a tag 230 and each of the first user's devices 221-223 have embedded tags 230. The tags 230 are shown in FIG. 2 as shaded diamonds for the purposes of illustration.
  • A second user B 240 has a work area 245 in the office space 200. The second user B 240 has devices in the form of a personal computer 241, a mobile telephone 242, a laptop computer 243, and a PDA 244. These devices 241-244 are designated as belonging to the second user B 240. Second user B 240 has a tag 230 and each of the second user's devices 241-244 have embedded tags 230.
  • FIG. 2 shows the first user A 220 sitting at his desk in his work area 225. The work area 225 is scanned by sensors 213 and 214 mounted on the walls near the work area 225 detecting the tags 230 of the first user A 220 and all his devices 221-223 which are with him in the work area 225.
  • FIG. 2 shows the second user B 240 walking out of the office space 200. He has left his work area 245 and passed the door sensor 211 leaving the office space 200. Second user B 240 is carrying his mobile telephone 242 and has his PDA 244 with him but has left his personal computer 241 and his laptop computer 243 on his desk in his work area 245. Wall sensors 215, 216 mounted on walls near his work area 245 scan the tags 230 in the personal computer 241 and the laptop computer 243. The door sensor 211 scans the tags 230 of the second user B 240 and his mobile telephone 242 and his PDA 244.
  • RFID sensors 211-216 detect the presence of compatible RFID tags 230 nearby. By placing RFID sensors at the entrance and exit points of designated rooms it is possible to detect when a user or device carrying an RFID tag is nearby. By combining this information with data obtained from direction sensors at the same entry or exit point it is possible to determine that a certain user or a device has entered or exited a room. If the last detected event for a user or device is to have entered a room, the system will implicitly assume that this user or device is currently present in this room.
  • An office space 200 can be divided into areas, which may be of uniform size or which may vary in size. One or more sensors may scan an area. Sensors may also be provided at points of entry or exit from areas.
  • Referring to FIG. 3, a system 300 is shown. A plurality of sensors 211-213 are provided each with an antenna 311, a reader 312 and a transmitter 313. Sensors 211, 212 which are located on entry or exit points of an area also have direction detectors 314 to determine if a tag has passed into or out of an area.
  • The sensors 211-213 transmit data read from tags to a location application 320 which is provided on a server 330. The data may be transmitted via a network 340, for example, a LAN, or the Internet.
  • The server 330 also runs a client service application 350. Client devices 370 with tags 230 (for example, a tagged personal computer 221 or a tagged mobile telephone 222) run the client side 355 service applications 350 via the network 340. The service application 350 enables commands to be sent by the server 330 to a client device 370 to lock the device 370.
  • The server 330 is also coupled to a database 360 which persistently stores the location information of the users and devices. By having this location information available, it is possible to determine whether a device and its owner are situated in the same or different places. Furthermore, the system will store an association between a device and its owner, with the possibility of having more than one device linked to a particular user.
  • Each tagged device 370 has a service application 355 running that is able to receive commands from the centralized server 330. Whenever the system detects that a user or device leaves an area (for example, a room), the location of the user in question is derived, followed by the location of the devices assigned to the user. If it is the case that any of these associated pairs of entities are in different locations, a message is sent to the service 355 running on the device 370, which secures the device 370 (for example, by issuing the lock command to a computer).
  • As a further refinement, the system will only lock if the two entities are in different locations to each other for predetermined amount of time (e.g. approximately 5 seconds) after the location change is detected. This is to ensure that a lock command is sent in error due to a delay in the system's location sensing mechanism.
  • FIGS. 4A and 4B are flow diagrams 400, 450 of methods of operation as implemented by the server 330 starting when a user and device are in the same location.
  • The flow diagram 400 of FIG. 4A starts with a user and a device in the same location 401 and therefore the device is unlocked. A sensor detects 402 the change in location of the device, for example, a door sensor may detect movement of the device out of a room or work area.
  • There may be a number of scenarios in which the device leaves a location, including the following:
  • the user who started off in the same location as the device has changed location with the device, for example, by carrying the device out of a room;
  • another associated user has taken the device from the location whilst the first user remains in the location; or
  • an unauthorized person has taken the device from the location.
  • A device may have more than one associated user and these users are determined 403 in the next step of the method. The method then determines 404 the location of one of the associated users and whether or not the location is the same as the location of the device 405. If the location is the same as the device 406, the device is kept unlocked 407. As the device is with one of the associated users, the location of any other associated users is not relevant and therefore the method returns to the start 401 with a user and the device in the same location.
  • However, if the location 408 is not the same as the location of the device, it is then determined 409 if there is another associated user. If so, the method loops 410 to determine 404 the location of the next associated user. If the location 408 is not the same as the device and there are no further associated users 411, a message is sent to the service on the device to lock it 412. The device is locked as it is not in the same location as any one of the associated users.
  • The flow diagram 450 of FIG. 4B also starts with a user and a device in the same location 451 and therefore the device is unlocked. A sensor detects 452 the change in location of the user, for example, a door sensor may detect movement of the user out of a room or work area. In this case it is necessary to lock all devices which the user has left behind, whilst keeping unlocked any devices the user has taken with him.
  • The method determines 453 the devices associated with the user and determines 454 the location of each device in turn. It is determined 455 if the location of the device is the same as the location of the user. If the location is the same 456, the device is kept unlocked 457. If the location is not the same 458, a message is sent to the service on the device to lock it 459. In both case, the method proceeds to determine 460 if there is another device. If there is another device, the method loops 461 to determine the location of the next device 454. If there are no more devices, the method ends with each device being locked or unlocked according to its location 462.
  • There may be an extra iteration of the method once it is determined that a device is in a different location to the user 458, in that it may be in the same location as another associated user.
  • FIGS. 5A and 5B are flow diagrams 500, 550 of methods of operation as implemented by the server 330 starting when a user and device are in different locations.
  • The flow diagram 500 of FIG. 5A starts with the user and device in different locations 501. A sensor detects 502 a change in location of a device. The users associated with the device which has moved are determined 503.
  • The method then determines 504 the location of one of the associated users and whether or not the location is the same as the location of the device 505. If the location is the same as the device 506, a message is sent to the service on the device to unlocked it 507 as it is now in the same location as an associated user. As the device is with one of the associated users, the location of any other associated users is not relevant and therefore the method ends with a user and the device in the same location.
  • However, if the location 508 is not the same as the location of the device, it is then determined 509 if there is another associated user. If so, the method loops 510 to determine 504 the location of the next associated user. If the location 508 is not the same as the device and there are no further associated users 511 the device remains locked 512.
  • The flow diagram 550 of FIG. 5B starts with the user and device in different locations 551.
  • A sensor detects 552 the change in location of the user, for example, a door sensor may detect movement of the user into a room or work area. In this case it is necessary to unlock all devices in the location the user has arrived at.
  • The method determines 553 the devices associated with the user and determines 554 the location of each device in turn. It is determined 555 if the location of the device is the same as the location of the user. If the location is the same 556 a message is sent to the device to unlock it 557. If the location is not the same 558, the device remains locked 559. In both case, the method proceeds to determine 560 if there is another device. If there is another device, the method loops 561 to determine the location of the next device 554. If there are no more devices, the method ends with each device being locked or unlocked according to its location 562.
  • Using these methods the following examples may occur.
  • Whenever a user leaves a room, his devices will be automatically secured thus ensuring the security of data. For example, his computer will lock, and he will be logged out of his phone.
  • If a laptop is taken from a room in which the owner is present (i.e. someone else is removing the laptop) the computer will automatically lock.
  • Whenever an employee enters the room in which his computer is located, an unlock command is automatically sent to the computer.
  • The operation of the location application and client service application may be provided as a service to a customer over a network.
  • The figures include block diagram and flowchart illustrations of methods, apparatus(s) and computer program products according to an embodiment of the invention. It will be understood that each block in such figures, and combinations of these blocks, can be implemented by computer program instructions. These computer program instructions may be loaded onto a computer or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the block or blocks.
  • Those skilled in the art should readily appreciate that programs defining the functions of the present invention can be delivered to a computer in many forms; including, but not limited to: (a) information permanently stored on non-writable storage media (e.g. read only memory devices within a computer such as ROM or CD-ROM disks readable by a computer I/O attachment); (b) information alterably stored on writable storage media (e.g. floppy disks and hard drives); or (c) information conveyed to a computer through communication media for example using wireless, baseband signaling or broadband signaling techniques, including carrier wave signaling techniques, such as over computer or telephone networks via a modem.
  • While the invention is described through the above exemplary embodiments, it will be understood by those of ordinary skill in the art that modification to and variation of the illustrated embodiments may be made without departing from the inventive concepts herein disclosed.

Claims (20)

1. A system for locking electronic devices, comprising:
a plurality of identification tags each identifying a user;
a plurality of electronic devices each having an identification tag;
location sensors for detecting the location of a tag;
a database storing location information of tags and associations of a user with a plurality of devices; and
a remote locking means to invoke a lock command or an unlock command on an electronic device.
2. A system as claimed claim 1, wherein the remote locking means invokes a lock command or an unlock command depending on the locations of a user and an associated device.
3. A system as claimed in claim 1, wherein the identification tags are radio frequency identification transponders and the location sensors are radio frequency identification readers.
4. A system as claimed in claim 1, wherein a controller receives location information transmitted by the location sensors and stores the information in the database.
5. A system as claimed in claim 1, wherein at least some of the location sensors are provided at entry and exit points of a room and include direction sensors.
6. A system as claimed in claim 1, wherein the remote locking means is provided on a server which issues commands to a service on a remote electronic device.
7. A system as claimed in claim 1, wherein an electronic device can have one or more associated users.
8. A system as claimed in claim 1, wherein an electronic device is locked if it is not is the same location as one of its associated users.
9. A system as claimed in claim 1, wherein the remote locking means operates via a network.
10. A method for locking electronic devices, comprising:
detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user;
determining the location of an electronic device and an associated user;
invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
11. A method as claimed in claim 10, wherein the identification tags are radio frequency identification transponders and the location is determined by radio frequency identification readers.
12. A method as claimed in claim 10, wherein location information transmitted by location sensors is received and stored.
13. A method as claimed in claim 10, wherein detecting the location includes detecting the direction of movement at an entry or exit point.
14. A method as claimed in claim 10, wherein invoking a lock or unlock command includes a server issuing a command to a service on a remote electronic device.
15. A method as claimed in claim 10, wherein the lock or unlock command is invoked depending on the locations of a user and an associated device.
16. A method as claimed in claim 10, wherein an electronic device can have one or more associated users.
17. A method as claimed in claim 10, wherein an electronic device is locked if it is not is the same location as one of its associated users.
18. A method as claimed in claim 10, wherein lock and unlock commands are invoked via a network.
19. A computer program product stored on a computer readable storage medium, comprising computer readable program code means for performing the steps of:
detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user;
determining the location of an electronic device and an associated user;
invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
20. A method of providing a service to a customer over a network, the service comprising:
detecting identification tags of a user and identification tags in a plurality of electronic devices associated with a user;
determining the location of an electronic device and an associated user;
invoking a lock or unlock action on the electronic device dependent on whether the electronic device and an associated user are in the same location.
US11/424,609 2006-01-11 2006-06-16 System and method for locking electronic devices Abandoned US20070164847A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0600465.9A GB0600465D0 (en) 2006-01-11 2006-01-11 System And Method For Locking Electronic Devices
GBGB0600465.9 2006-01-11

Publications (1)

Publication Number Publication Date
US20070164847A1 true US20070164847A1 (en) 2007-07-19

Family

ID=35997822

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/424,609 Abandoned US20070164847A1 (en) 2006-01-11 2006-06-16 System and method for locking electronic devices

Country Status (2)

Country Link
US (1) US20070164847A1 (en)
GB (1) GB0600465D0 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009013385A1 (en) * 2007-07-20 2009-01-29 Nokia Corporation Information sharing in a smart space
US7515048B1 (en) 2008-05-20 2009-04-07 International Business Machines Corporation Method and system for using RFID to automatically lock and unlock a mobile computing device
US20100088762A1 (en) * 2008-10-03 2010-04-08 At&T Intellectual Property I, L.P. Apparatus and method for monitoring network equipment
FR2942894A1 (en) * 2009-03-05 2010-09-10 Frederic Glaubert Computing equipment managing method for defined zone e.g. office, involves changing state of computer allocated to person by remote control unit in response to detection of person outside zone, based on pre-established rules
US20100245073A1 (en) * 2009-03-25 2010-09-30 Honeywell International Inc. Method and apparatus for interrogation of a security system
US20130127615A1 (en) * 2011-11-14 2013-05-23 Ultraclenz, Llc Sanitization compliance monitoring system with security enhancements
EP2811724A1 (en) * 2013-06-07 2014-12-10 BlackBerry Limited Mobile wireless communications device providing near field communication (nfc) unlock and tag data change features and related methods
US9276643B2 (en) 2013-06-07 2016-03-01 Blackberry Limited Mobile wireless communications device providing near field communication (NFC) unlock and tag data change features and related methods
US20160088432A1 (en) * 2014-09-18 2016-03-24 Booz Allen & Hamilton System and method for location-based security
US20170154172A1 (en) * 2015-11-27 2017-06-01 International Business Machines Corporation Control access to function of information device
US9830443B2 (en) 2013-07-12 2017-11-28 Blinksight Device and method for controlling access to at least one machine
US10372923B2 (en) 2018-01-09 2019-08-06 Booz Allen Hamilton Inc. System and method for controlling the power states of a mobile computing device
CN110753929A (en) * 2017-04-19 2020-02-04 石原健一 Computer locking system
US11080378B1 (en) 2007-12-06 2021-08-03 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US11086979B1 (en) 2007-12-19 2021-08-10 Proxense, Llc Security system and method for controlling access to computing resources
US11095640B1 (en) 2010-03-15 2021-08-17 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US11113482B1 (en) 2011-02-21 2021-09-07 Proxense, Llc Implementation of a proximity-based system for object tracking and automatic application initialization
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
US11157909B2 (en) 2006-05-05 2021-10-26 Proxense, Llc Two-level authentication for secure transactions
US20210382968A1 (en) * 2007-09-27 2021-12-09 Clevx, Llc Secure access device with multiple authentication mechanisms
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US11258791B2 (en) 2004-03-08 2022-02-22 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US11546325B2 (en) 2010-07-15 2023-01-03 Proxense, Llc Proximity-based system for object tracking
US11553481B2 (en) 2006-01-06 2023-01-10 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US11562644B2 (en) * 2007-11-09 2023-01-24 Proxense, Llc Proximity-sensor supporting multiple application services
US11727355B2 (en) 2008-02-14 2023-08-15 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
US11914695B2 (en) 2013-05-10 2024-02-27 Proxense, Llc Secure element as a digital pocket

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5821854A (en) * 1997-06-16 1998-10-13 Motorola, Inc. Security system for a personal computer
US20040056759A1 (en) * 2002-09-23 2004-03-25 Ungs Kelly J. Method and system for limiting use of electronic equipment
US20040124982A1 (en) * 2002-10-17 2004-07-01 Aram Kovach Method for tracking and processing passengers and their transported articles
US6909356B2 (en) * 2000-11-03 2005-06-21 Seecontrol, Inc. Method and apparatus for associating the movement of goods with the identity of an individual moving the goods
US6933849B2 (en) * 2002-07-09 2005-08-23 Fred Sawyer Method and apparatus for tracking objects and people
US20050200453A1 (en) * 2004-01-27 2005-09-15 Turner Richard H Method and apparatus for detection and tracking of objects within a defined area
US7142119B2 (en) * 2004-06-30 2006-11-28 Sap Ag Monitoring and alarm system
US7298240B2 (en) * 2004-09-24 2007-11-20 David Lamar Electronically enabling devices remotely
US7319397B2 (en) * 2004-08-26 2008-01-15 Avante International Technology, Inc. RFID device for object monitoring, locating, and tracking
US7323991B1 (en) * 2005-05-12 2008-01-29 Exavera Technologies Incorporated System and method for locating and communicating with personnel and equipment in a facility
US7382261B2 (en) * 2005-02-05 2008-06-03 Compal Electronics, Inc. Radio frequency identification security system and method
US7388481B1 (en) * 2004-09-22 2008-06-17 At&T Corp. Method and apparatus for asset management in an open environment
US7391326B2 (en) * 2003-11-24 2008-06-24 Black & Decker Inc. Wireless asset monitoring and security system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5821854A (en) * 1997-06-16 1998-10-13 Motorola, Inc. Security system for a personal computer
US6909356B2 (en) * 2000-11-03 2005-06-21 Seecontrol, Inc. Method and apparatus for associating the movement of goods with the identity of an individual moving the goods
US6933849B2 (en) * 2002-07-09 2005-08-23 Fred Sawyer Method and apparatus for tracking objects and people
US20040056759A1 (en) * 2002-09-23 2004-03-25 Ungs Kelly J. Method and system for limiting use of electronic equipment
US20040124982A1 (en) * 2002-10-17 2004-07-01 Aram Kovach Method for tracking and processing passengers and their transported articles
US7391326B2 (en) * 2003-11-24 2008-06-24 Black & Decker Inc. Wireless asset monitoring and security system
US20050200453A1 (en) * 2004-01-27 2005-09-15 Turner Richard H Method and apparatus for detection and tracking of objects within a defined area
US7142119B2 (en) * 2004-06-30 2006-11-28 Sap Ag Monitoring and alarm system
US7319397B2 (en) * 2004-08-26 2008-01-15 Avante International Technology, Inc. RFID device for object monitoring, locating, and tracking
US7388481B1 (en) * 2004-09-22 2008-06-17 At&T Corp. Method and apparatus for asset management in an open environment
US7298240B2 (en) * 2004-09-24 2007-11-20 David Lamar Electronically enabling devices remotely
US7382261B2 (en) * 2005-02-05 2008-06-03 Compal Electronics, Inc. Radio frequency identification security system and method
US7323991B1 (en) * 2005-05-12 2008-01-29 Exavera Technologies Incorporated System and method for locating and communicating with personnel and equipment in a facility

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11922395B2 (en) 2004-03-08 2024-03-05 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US11258791B2 (en) 2004-03-08 2022-02-22 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US11219022B2 (en) 2006-01-06 2022-01-04 Proxense, Llc Wireless network synchronization of cells and client devices on a network with dynamic adjustment
US11800502B2 (en) 2006-01-06 2023-10-24 Proxense, LL Wireless network synchronization of cells and client devices on a network
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US11553481B2 (en) 2006-01-06 2023-01-10 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US11212797B2 (en) 2006-01-06 2021-12-28 Proxense, Llc Wireless network synchronization of cells and client devices on a network with masking
US11157909B2 (en) 2006-05-05 2021-10-26 Proxense, Llc Two-level authentication for secure transactions
US11182792B2 (en) 2006-05-05 2021-11-23 Proxense, Llc Personal digital key initialization and registration for secure transactions
US11551222B2 (en) 2006-05-05 2023-01-10 Proxense, Llc Single step transaction authentication using proximity and biometric input
US8466790B2 (en) 2007-07-20 2013-06-18 Nokia Corporation Information sharing in a smart space
WO2009013385A1 (en) * 2007-07-20 2009-01-29 Nokia Corporation Information sharing in a smart space
US20100283613A1 (en) * 2007-07-20 2010-11-11 Arto Palin Information Sharing in a Smart Space
US20210382968A1 (en) * 2007-09-27 2021-12-09 Clevx, Llc Secure access device with multiple authentication mechanisms
US11562644B2 (en) * 2007-11-09 2023-01-24 Proxense, Llc Proximity-sensor supporting multiple application services
US20230146442A1 (en) * 2007-11-09 2023-05-11 Proxense, Llc Proximity-Sensor Supporting Multiple Application Services
US11080378B1 (en) 2007-12-06 2021-08-03 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US11086979B1 (en) 2007-12-19 2021-08-10 Proxense, Llc Security system and method for controlling access to computing resources
US11727355B2 (en) 2008-02-14 2023-08-15 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
US11120449B2 (en) 2008-04-08 2021-09-14 Proxense, Llc Automated service-based order processing
US7515048B1 (en) 2008-05-20 2009-04-07 International Business Machines Corporation Method and system for using RFID to automatically lock and unlock a mobile computing device
US20100088762A1 (en) * 2008-10-03 2010-04-08 At&T Intellectual Property I, L.P. Apparatus and method for monitoring network equipment
US8732859B2 (en) * 2008-10-03 2014-05-20 At&T Intellectual Property I, L.P. Apparatus and method for monitoring network equipment
FR2942894A1 (en) * 2009-03-05 2010-09-10 Frederic Glaubert Computing equipment managing method for defined zone e.g. office, involves changing state of computer allocated to person by remote control unit in response to detection of person outside zone, based on pre-established rules
US20100245073A1 (en) * 2009-03-25 2010-09-30 Honeywell International Inc. Method and apparatus for interrogation of a security system
US8269623B2 (en) * 2009-03-25 2012-09-18 Honeywell International Inc. Method and apparatus for interrogation of a security system
US11095640B1 (en) 2010-03-15 2021-08-17 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US11546325B2 (en) 2010-07-15 2023-01-03 Proxense, Llc Proximity-based system for object tracking
US11669701B2 (en) 2011-02-21 2023-06-06 Proxense, Llc Implementation of a proximity-based system for object tracking and automatic application initialization
US11132882B1 (en) 2011-02-21 2021-09-28 Proxense, Llc Proximity-based system for object tracking and automatic application initialization
US11113482B1 (en) 2011-02-21 2021-09-07 Proxense, Llc Implementation of a proximity-based system for object tracking and automatic application initialization
US20130127615A1 (en) * 2011-11-14 2013-05-23 Ultraclenz, Llc Sanitization compliance monitoring system with security enhancements
US11914695B2 (en) 2013-05-10 2024-02-27 Proxense, Llc Secure element as a digital pocket
US9276643B2 (en) 2013-06-07 2016-03-01 Blackberry Limited Mobile wireless communications device providing near field communication (NFC) unlock and tag data change features and related methods
EP2811724A1 (en) * 2013-06-07 2014-12-10 BlackBerry Limited Mobile wireless communications device providing near field communication (nfc) unlock and tag data change features and related methods
US9830443B2 (en) 2013-07-12 2017-11-28 Blinksight Device and method for controlling access to at least one machine
US20160088432A1 (en) * 2014-09-18 2016-03-24 Booz Allen & Hamilton System and method for location-based security
US9848291B2 (en) * 2014-09-18 2017-12-19 Booz Allen Hamilton Inc. System and method for location-based security
US20170303131A1 (en) * 2014-09-18 2017-10-19 Booz Allen Hamilton Inc. System and method for location-based security
US10244347B2 (en) * 2014-09-18 2019-03-26 Booz Allen Hamilton Inc. System and method for location-based security
US10049194B2 (en) * 2015-11-27 2018-08-14 International Business Machines Corporation Control access to function of information device
US20170154172A1 (en) * 2015-11-27 2017-06-01 International Business Machines Corporation Control access to function of information device
EP3614294A4 (en) * 2017-04-19 2021-01-06 Kenichi Ishihara Computer lock system
CN110753929A (en) * 2017-04-19 2020-02-04 石原健一 Computer locking system
US10372923B2 (en) 2018-01-09 2019-08-06 Booz Allen Hamilton Inc. System and method for controlling the power states of a mobile computing device

Also Published As

Publication number Publication date
GB0600465D0 (en) 2006-02-22

Similar Documents

Publication Publication Date Title
US20070164847A1 (en) System and method for locking electronic devices
US10659917B2 (en) Tracking for badge carrier
US7061366B2 (en) Finding location and ranging explorer
EP2894609B1 (en) System for accessing secured areas
Verma et al. A digital security system with door lock system using RFID technology
US9557719B2 (en) Access control system using smart phone
US7388481B1 (en) Method and apparatus for asset management in an open environment
JP5410446B2 (en) System and method for object location and path identification based on RFID detection
EP1016947A2 (en) Portable electronic equipment key
US20070241901A1 (en) System and method for object tracking via tag readings
US8738918B2 (en) Document evidence and article retrieval and identification system
US20080120200A1 (en) Method and system for automatic inventory variance identification
US20070046439A1 (en) Radio frequency identification system with device for protecting privacy and method of operation
US20150172264A1 (en) System and method for user authentication
US20060132304A1 (en) Rule-based management of objects
JP2006350682A (en) Document management system
US9830443B2 (en) Device and method for controlling access to at least one machine
US20100237989A1 (en) Goods management device and goods management system
US20070006298A1 (en) Controlling access to a workstation system via wireless communication
US20180102583A1 (en) Frictionless Access Control System with Ceiling Tile Positioning Unit
US20050287986A1 (en) System and method for securing mobile equipment
Alshammri et al. Survey on radio frequency identification security and attacks
CN202373004U (en) RFID-based confidential article supervisory system
JP2008282299A (en) Entrance and exit control system, information terminal, and authentication information communication method and program
JP2006178591A (en) Authentication device, security device and authentication method for security device

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CRAWFORD, MICHAEL;FAIRMICHAEL, FINTAN;O'RIORDAN, KEVIN TADGH;AND OTHERS;REEL/FRAME:017799/0209;SIGNING DATES FROM 20060612 TO 20060613

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION